From 0c638c2aec7e8f6f0a615b0ffed400b59cef4509 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa Date: Thu, 15 Jan 2026 17:25:09 +0700 Subject: [PATCH] fix: wrong year cves --- code/cves/2022/CVE-2022-42475.yaml | 2 +- headless/cves/2024/CVE-2024-29882.yaml | 2 +- http/cves/2018/CVE-2018-10383.yaml | 2 +- http/cves/2018/CVE-2018-19276.yaml | 2 +- http/cves/2021/CVE-2021-24295.yaml | 2 +- http/cves/2021/CVE-2021-34630.yaml | 2 +- http/cves/2021/CVE-2021-44260.yaml | 2 +- http/cves/2022/CVE-2022-38130.yaml | 2 +- http/cves/2022/CVE-2022-3869.yaml | 2 +- http/cves/2022/CVE-2022-40624.yaml | 2 +- http/cves/2023/CVE-2023-3519.yaml | 2 +- http/cves/2023/CVE-2023-4151.yaml | 2 +- http/cves/2023/CVE-2023-41954.yaml | 2 +- http/cves/2023/CVE-2023-45136.yaml | 2 +- http/cves/2023/CVE-2023-46732.yaml | 2 +- http/cves/2023/CVE-2023-48241.yaml | 2 +- http/cves/2023/CVE-2023-49489.yaml | 2 +- http/cves/2023/CVE-2023-50719.yaml | 2 +- http/cves/2023/CVE-2023-50720.yaml | 2 +- http/cves/2023/CVE-2023-51449.yaml | 2 +- http/cves/2024/CVE-2024-25608.yaml | 2 +- http/cves/2024/CVE-2024-27443.yaml | 2 +- http/cves/2024/CVE-2024-36683.yaml | 2 +- http/cves/2024/CVE-2024-50857.yaml | 2 +- http/cves/2025/CVE-2025-2264.yaml | 2 +- http/cves/2025/CVE-2025-5086.yaml | 2 +- javascript/cves/2019/CVE-2019-9193.yaml | 2 +- network/cves/2023/CVE-2023-48788.yaml | 2 +- 28 files changed, 28 insertions(+), 28 deletions(-) diff --git a/code/cves/2022/CVE-2022-42475.yaml b/code/cves/2022/CVE-2022-42475.yaml index 466dceb3af0..1f0c1c13ac8 100644 --- a/code/cves/2022/CVE-2022-42475.yaml +++ b/code/cves/2022/CVE-2022-42475.yaml @@ -38,7 +38,7 @@ info: fofa-query: - body="/remote/login" "xxxxxxxx" - icon_hash="945408572" - tags: cve,cve2024,ssl-vpn,vpn,fortios,fortigate,heap-based,bufferoverflow,kev,vkev,vuln + tags: cve,cve2022,ssl-vpn,vpn,fortios,fortigate,heap-based,bufferoverflow,kev,vkev,vuln flow: http () && code() http: diff --git a/headless/cves/2024/CVE-2024-29882.yaml b/headless/cves/2024/CVE-2024-29882.yaml index a534ed5a5b2..8b9ef2f8207 100644 --- a/headless/cves/2024/CVE-2024-29882.yaml +++ b/headless/cves/2024/CVE-2024-29882.yaml @@ -26,7 +26,7 @@ info: vendor: ossrs product: simple_realtime_server shodan-query: http.favicon.hash:1386054408 - tags: cve,cve2023,srs,dom,xss,vuln + tags: cve,cve2024,srs,dom,xss,vuln headless: - steps: diff --git a/http/cves/2018/CVE-2018-10383.yaml b/http/cves/2018/CVE-2018-10383.yaml index 23619648623..12e70a3d8df 100644 --- a/http/cves/2018/CVE-2018-10383.yaml +++ b/http/cves/2018/CVE-2018-10383.yaml @@ -28,7 +28,7 @@ info: product: securelinx_spider_firmware shodan-query: title:"Lantronix" fofa-query: title="Lantronix" - tags: cve,cve2022,lantronix,securelinx,sls,xss,vuln + tags: cve,cve2018,lantronix,securelinx,sls,xss,vuln flow: http(1) && http(2) diff --git a/http/cves/2018/CVE-2018-19276.yaml b/http/cves/2018/CVE-2018-19276.yaml index b5124e363b3..67ef3ad888f 100644 --- a/http/cves/2018/CVE-2018-19276.yaml +++ b/http/cves/2018/CVE-2018-19276.yaml @@ -28,7 +28,7 @@ info: vendor: openmrs product: openmrs shodan-query: html:"OpenMRS" - tags: cve,cve20218,openmrs,deserialization,rce,vkev,vuln + tags: cve,cve20188,openmrs,deserialization,rce,vkev,vuln http: - raw: diff --git a/http/cves/2021/CVE-2021-24295.yaml b/http/cves/2021/CVE-2021-24295.yaml index f03ebd7e632..c0bf309870c 100644 --- a/http/cves/2021/CVE-2021-24295.yaml +++ b/http/cves/2021/CVE-2021-24295.yaml @@ -27,7 +27,7 @@ info: product: spam_protection\,_antispam\,_firewall framework: wordpress fofa-query: body="/plugin/cleantalk-spam-protect/" - tags: cve,cve2024,wpscan,wordpress,wp,wp-plugin,cleantalk-spam-protect,sqli,passive,vkev,vuln + tags: cve,cve2021,wpscan,wordpress,wp,wp-plugin,cleantalk-spam-protect,sqli,passive,vkev,vuln http: - raw: diff --git a/http/cves/2021/CVE-2021-34630.yaml b/http/cves/2021/CVE-2021-34630.yaml index 095e0a4457f..8a724f80626 100644 --- a/http/cves/2021/CVE-2021-34630.yaml +++ b/http/cves/2021/CVE-2021-34630.yaml @@ -28,7 +28,7 @@ info: product: gtranslate framework: wordpress fofa-query: body="/wp-content/plugins/gtranslate" - tags: cve,cve2022,wordpress,wp,wp-plugin,gtranslate,xss,vuln + tags: cve,cve2021,wordpress,wp,wp-plugin,gtranslate,xss,vuln http: - method: GET diff --git a/http/cves/2021/CVE-2021-44260.yaml b/http/cves/2021/CVE-2021-44260.yaml index 06932b2f719..60916449734 100644 --- a/http/cves/2021/CVE-2021-44260.yaml +++ b/http/cves/2021/CVE-2021-44260.yaml @@ -25,7 +25,7 @@ info: vendor: wavlink product: wl-wn531g3_firmware fofa-query: body="AC1200" && body="wavlink" - tags: cve,cve2022,wavlink,exposure,ac1200,vuln + tags: cve,cve2021,wavlink,exposure,ac1200,vuln http: - method: GET diff --git a/http/cves/2022/CVE-2022-38130.yaml b/http/cves/2022/CVE-2022-38130.yaml index 1b9bec17cbf..a982055c80c 100644 --- a/http/cves/2022/CVE-2022-38130.yaml +++ b/http/cves/2022/CVE-2022-38130.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: keysight product: sensor_management_server - tags: cve,cve2025,keysight,sensor_management_server,rce,vkev,oast,oob + tags: cve,cve2022,keysight,sensor_management_server,rce,vkev,oast,oob variables: cmd: '\\\\{{interactsh-url}}\\test' diff --git a/http/cves/2022/CVE-2022-3869.yaml b/http/cves/2022/CVE-2022-3869.yaml index d06cdef841d..6bb05ddb64f 100644 --- a/http/cves/2022/CVE-2022-3869.yaml +++ b/http/cves/2022/CVE-2022-3869.yaml @@ -25,7 +25,7 @@ info: max-request: 1 shodan-query: title:"Froxlor" product: froxlor - tags: cve2023,cve,froxlor,html,vuln + tags: cve2022,cve,froxlor,html,vuln http: - method: GET diff --git a/http/cves/2022/CVE-2022-40624.yaml b/http/cves/2022/CVE-2022-40624.yaml index a45cdad027e..26809bf92a9 100644 --- a/http/cves/2022/CVE-2022-40624.yaml +++ b/http/cves/2022/CVE-2022-40624.yaml @@ -26,7 +26,7 @@ info: product: pfblockerng shodan-query: "pfBlockerNG" fofa-query: "pfBlockerNG" - tags: cve,cve2024,pfsense,pfblockerng,rce,sqli,netgate,vuln + tags: cve,cve2022,pfsense,pfblockerng,rce,sqli,netgate,vuln flow: http(1) && http(2) diff --git a/http/cves/2023/CVE-2023-3519.yaml b/http/cves/2023/CVE-2023-3519.yaml index 01fac6c8478..df553b8cd65 100644 --- a/http/cves/2023/CVE-2023-3519.yaml +++ b/http/cves/2023/CVE-2023-3519.yaml @@ -29,7 +29,7 @@ info: - title="netscaler aaa" - title="citrix gateway" || title:"netscaler gateway" shodan-query: http.title:"citrix gateway" || title:"netscaler gateway" - tags: cve,cve2025,citrix,saml,rce,kev,passive,vkev,vuln + tags: cve,cve2023,citrix,saml,rce,kev,passive,vkev,vuln http: - raw: diff --git a/http/cves/2023/CVE-2023-4151.yaml b/http/cves/2023/CVE-2023-4151.yaml index c940b4af95f..4052616d0e4 100644 --- a/http/cves/2023/CVE-2023-4151.yaml +++ b/http/cves/2023/CVE-2023-4151.yaml @@ -29,7 +29,7 @@ info: fofa-query: body="/wp-content/plugins/agile-store-locator" publicwww-query: /wp-content/plugins/agile-store-locator/ shodan-query: http.html:"/wp-content/plugins/agile-store-locator/" - tags: cve,cve2024,wp,wordpress,wp-plugin,agile-store-locator,xss,vuln + tags: cve,cve2023,wp,wordpress,wp-plugin,agile-store-locator,xss,vuln flow: http(1) && http(2) diff --git a/http/cves/2023/CVE-2023-41954.yaml b/http/cves/2023/CVE-2023-41954.yaml index 1599d0ab144..a9b1e1eabfc 100644 --- a/http/cves/2023/CVE-2023-41954.yaml +++ b/http/cves/2023/CVE-2023-41954.yaml @@ -31,7 +31,7 @@ info: fofa-query: body="/wp-content/plugins/wp-user-avatar/" publicwww-query: "/wp-content/plugins/wp-user-avatar/" shodan-query: http.component:"profilepress" - tags: cve,cve2022,wordpress,wp,wp-plugin,properfraction,profilepress,vkev + tags: cve,cve2023,wordpress,wp,wp-plugin,properfraction,profilepress,vkev flow: http(1) && http(2) diff --git a/http/cves/2023/CVE-2023-45136.yaml b/http/cves/2023/CVE-2023-45136.yaml index edc43ad6988..03f7401fabc 100644 --- a/http/cves/2023/CVE-2023-45136.yaml +++ b/http/cves/2023/CVE-2023-45136.yaml @@ -28,7 +28,7 @@ info: product: xwiki shodan-query: html:"data-xwiki-reference" fofa-query: body="data-xwiki-reference" - tags: cve,cve2024,xwiki,xss,vuln + tags: cve,cve2023,xwiki,xss,vuln http: - method: GET diff --git a/http/cves/2023/CVE-2023-46732.yaml b/http/cves/2023/CVE-2023-46732.yaml index d6540f0f841..fef138aec9a 100644 --- a/http/cves/2023/CVE-2023-46732.yaml +++ b/http/cves/2023/CVE-2023-46732.yaml @@ -28,7 +28,7 @@ info: product: xwiki shodan-query: html:"data-xwiki-reference" fofa-query: body="data-xwiki-reference" - tags: cve,cve2024,xwiki,xss,vkev,vuln + tags: cve,cve2023,xwiki,xss,vkev,vuln http: - method: GET diff --git a/http/cves/2023/CVE-2023-48241.yaml b/http/cves/2023/CVE-2023-48241.yaml index 42f03d7c9df..3a5b61c3d64 100644 --- a/http/cves/2023/CVE-2023-48241.yaml +++ b/http/cves/2023/CVE-2023-48241.yaml @@ -28,7 +28,7 @@ info: product: xwiki shodan-query: html:"data-xwiki-reference" fofa-query: body="data-xwiki-reference" - tags: cve,cve2024,xwiki,exposure,vuln + tags: cve,cve2023,xwiki,exposure,vuln http: - method: GET diff --git a/http/cves/2023/CVE-2023-49489.yaml b/http/cves/2023/CVE-2023-49489.yaml index c18f2fa4acf..05c8ded2882 100644 --- a/http/cves/2023/CVE-2023-49489.yaml +++ b/http/cves/2023/CVE-2023-49489.yaml @@ -24,7 +24,7 @@ info: vendor: kodcloud product: kodexplorer fofa-query: app="powered-by-kodexplorer" - tags: cve,cve2024,kodexplorer,xss,vuln + tags: cve,cve2023,kodexplorer,xss,vuln http: - raw: diff --git a/http/cves/2023/CVE-2023-50719.yaml b/http/cves/2023/CVE-2023-50719.yaml index 831d9ecec7e..28e955c8e85 100644 --- a/http/cves/2023/CVE-2023-50719.yaml +++ b/http/cves/2023/CVE-2023-50719.yaml @@ -28,7 +28,7 @@ info: product: xwiki shodan-query: html:"data-xwiki-reference" fofa-query: body="data-xwiki-reference" - tags: cve,cve2024,xwiki,password,exposure,vuln + tags: cve,cve2023,xwiki,password,exposure,vuln http: - method: GET diff --git a/http/cves/2023/CVE-2023-50720.yaml b/http/cves/2023/CVE-2023-50720.yaml index ce8f65afb9d..70fc0225497 100644 --- a/http/cves/2023/CVE-2023-50720.yaml +++ b/http/cves/2023/CVE-2023-50720.yaml @@ -28,7 +28,7 @@ info: product: xwiki shodan-query: html:"data-xwiki-reference" fofa-query: body="data-xwiki-reference" - tags: cve,cve2024,xwiki,email,exposure,vuln + tags: cve,cve2023,xwiki,email,exposure,vuln http: - method: GET diff --git a/http/cves/2023/CVE-2023-51449.yaml b/http/cves/2023/CVE-2023-51449.yaml index 80334391ff1..66b7a0d46d3 100644 --- a/http/cves/2023/CVE-2023-51449.yaml +++ b/http/cves/2023/CVE-2023-51449.yaml @@ -30,7 +30,7 @@ info: framework: python shodan-query: html:"__gradio_mode__" fofa-query: body="__gradio_mode__" - tags: cve,cve2024,lfi,gradio,unauth,intrusive,vuln + tags: cve,cve2023,lfi,gradio,unauth,intrusive,vuln variables: str: '{{rand_base(8)}}' diff --git a/http/cves/2024/CVE-2024-25608.yaml b/http/cves/2024/CVE-2024-25608.yaml index 15cc1d74d10..89396ffeff8 100644 --- a/http/cves/2024/CVE-2024-25608.yaml +++ b/http/cves/2024/CVE-2024-25608.yaml @@ -30,7 +30,7 @@ info: product: digital_experience_platform,liferay_portal shodan-query: http.favicon.hash:129457226 fofa-query: icon_hash=129457226 - tags: cve,cve2019,liferay,liferay-portal,digital-experience-platform,open-redirect,vkev + tags: cve,cve2024,liferay,liferay-portal,digital-experience-platform,open-redirect,vkev http: - method: GET diff --git a/http/cves/2024/CVE-2024-27443.yaml b/http/cves/2024/CVE-2024-27443.yaml index 7feb6dd251f..f27513da7bd 100644 --- a/http/cves/2024/CVE-2024-27443.yaml +++ b/http/cves/2024/CVE-2024-27443.yaml @@ -36,7 +36,7 @@ info: - app="zimbra-邮件系统" - body="zimbra collaboration suite web client" - icon_hash="475145467" - tags: cve,cve2022,zimbra,kev,passive,xss,vkev + tags: cve,cve2024,zimbra,kev,passive,xss,vkev http: - method: GET diff --git a/http/cves/2024/CVE-2024-36683.yaml b/http/cves/2024/CVE-2024-36683.yaml index 1744f1f954a..7850912209a 100644 --- a/http/cves/2024/CVE-2024-36683.yaml +++ b/http/cves/2024/CVE-2024-36683.yaml @@ -26,7 +26,7 @@ info: framework: prestashop shodan-query: html:"/productsalert" fofa-query: body="/productsalert" - tags: time-based-sqli,cve,cve2023,prestashop,sqli,productsalert,vuln + tags: time-based-sqli,cve,cve2024,prestashop,sqli,productsalert,vuln flow: http(1) && http(2) diff --git a/http/cves/2024/CVE-2024-50857.yaml b/http/cves/2024/CVE-2024-50857.yaml index bb07cd65b1d..47f0e82fa69 100644 --- a/http/cves/2024/CVE-2024-50857.yaml +++ b/http/cves/2024/CVE-2024-50857.yaml @@ -27,7 +27,7 @@ info: verified: true vendor: gestioip product: gestioip - tags: cve,cve2025,gestioip,xss,reflected,authenticated + tags: cve,cve2024,gestioip,xss,reflected,authenticated flow: http(1) && http(2) http: diff --git a/http/cves/2025/CVE-2025-2264.yaml b/http/cves/2025/CVE-2025-2264.yaml index 73f0cf3103d..cbcefc3020f 100644 --- a/http/cves/2025/CVE-2025-2264.yaml +++ b/http/cves/2025/CVE-2025-2264.yaml @@ -26,7 +26,7 @@ info: vendor: santesoft product: sante_pacs_server shodan-query: http.favicon.hash:1185161484 - tags: cve,cve2024,sante,pacs,lfi,vkev,vuln + tags: cve,cve2025,sante,pacs,lfi,vkev,vuln http: - raw: diff --git a/http/cves/2025/CVE-2025-5086.yaml b/http/cves/2025/CVE-2025-5086.yaml index 0ef0b9ca7d3..64e5a020c18 100644 --- a/http/cves/2025/CVE-2025-5086.yaml +++ b/http/cves/2025/CVE-2025-5086.yaml @@ -25,7 +25,7 @@ info: max-request: 1 shodan-query: html:"apriso" fofa-query: body="/Apriso/Portal" - tags: cve,cve2024,delmia,apriso,serialization,rce,kev,vkev,vuln + tags: cve,cve2025,delmia,apriso,serialization,rce,kev,vkev,vuln http: - raw: diff --git a/javascript/cves/2019/CVE-2019-9193.yaml b/javascript/cves/2019/CVE-2019-9193.yaml index 1d0373b4e66..36f22659b7f 100644 --- a/javascript/cves/2019/CVE-2019-9193.yaml +++ b/javascript/cves/2019/CVE-2019-9193.yaml @@ -19,7 +19,7 @@ info: classification: epss-score: 0.93587 epss-percentile: 0.99822 - tags: cve,cve2018,js,network,postgresql,intrusive,vkev,vuln + tags: cve,cve2019,js,network,postgresql,intrusive,vkev,vuln javascript: diff --git a/network/cves/2023/CVE-2023-48788.yaml b/network/cves/2023/CVE-2023-48788.yaml index c847c03cbd6..237435a5aa6 100644 --- a/network/cves/2023/CVE-2023-48788.yaml +++ b/network/cves/2023/CVE-2023-48788.yaml @@ -23,7 +23,7 @@ info: max-request: 1 vendor: fortinet product: forticlient_enterprise_management_server - tags: cve,cve2024,sqli,fortinet,kev,vkev,vuln + tags: cve,cve2023,sqli,fortinet,kev,vkev,vuln tcp: - inputs: